This was too good to pass up. For many, there is a perception that cloud computing lacks security. IBM is working on fixing that perception, with this [cute 2-minute video].
"The postings on this site solely reflect the personal views of each author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management."
(c) Copyright Tony Pearson and IBM Corporation. All postings are written by Tony Pearson unless noted otherwise.
Tony Pearson is employed by IBM. Mentions of IBM Products, solutions or services might be deemed as "paid endorsements" or "celebrity endorsements" by the US Federal Trade Commission.
Safe Harbor Statement: The information on IBM products is intended to outline IBM's general product direction and it should not be relied on in making a purchasing decision. The information on the new products is for informational purposes only and may not be incorporated into any contract. The information on IBM products is not a commitment, promise, or legal obligation to deliver any material, code, or functionality. The development, release, and timing of any features or functionality described for IBM products remains at IBM's sole discretion.
Tony Pearson is a an active participant in local, regional, and industry-specific interests, and does not receive any special payments to mention them on this blog.
Tony Pearson receives part of the revenue proceeds from sales of books he has authored listed in the side panel.
My books are available on Lulu.com! Order your copies today!
Featured Redbooks and Redpapers:
TonyPearson 120000HQFF Tags:  protection desktop pda iss information+infrastructur... security laptop 3,904 Views
Last week's earthquake in Haiti reminds us all how fragile systems can be. Part of a complete Information Infrastructure is Information Security. Back in 2006, IBM [acquired Internet Security Services]. This week, IBM announces two sets of ISS Data Security Services: These services can include assessments of your current environment, running workshops to help gather requirements, help design security policies, and even follow through with implementation.
Both of these services include implementation of help desk support as well. To learn more, check out the ISS [Virtual Briefing Center].